Access control and signatures via quorum secret sharing

被引:43
|
作者
Naor, M [1 ]
Wool, A
机构
[1] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
[2] Lucent Technol, Bell Labs, Murray Hill, NJ 07974 USA
基金
以色列科学基金会;
关键词
quorum systems; replication; secret sharing; security; cryptography;
D O I
10.1109/71.722223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. We propose a separation between access servers, which are protected and trustworthy, but may be outdated, and the data servers, which may all be compromised. The main paradigm is that only the servers in a complete quorum can collectively grant (or revoke) access permission. The method we suggest ensures that, after authorization is revoked, a cheating user Alice will not be able to access the data even if many access servers still consider her authorized and even if the complete raw database is available to her. The method has a low overhead in terms of communication and computation. It can also be converted into a distributed system for issuing secure signatures. An important building block in our method is the use of secret sharing schemes that realize the access structures of quorum systems. We provide several efficient constructions of such schemes which may be of interest in their own right.
引用
收藏
页码:909 / 922
页数:14
相关论文
共 50 条
  • [21] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [22] Secret sharing on regular bipartite access structures
    Máté Gyarmati
    Designs, Codes and Cryptography, 2023, 91 : 1951 - 1971
  • [23] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [24] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [25] Secret sharing via quantum entanglement
    Hillery, M
    Buzek, V
    ACTA PHYSICA SLOVACA, 1999, 49 (04) : 533 - 539
  • [26] Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
    Phalakarn, Kittiphop
    Suppakitpaisarn, Vorapong
    Attrapadung, Nuttapong
    Matsuura, Kanta
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 77 - 96
  • [27] A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
    Yu, Yuyin
    Wang, Mingsheng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 136 - 142
  • [28] Threshold Secret Sharing Scheme for Compartmented Access Structures
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 1 - 9
  • [29] Dynamic key generations for secret sharing in access structures
    Lin, CH
    Lee, W
    Chen, CS
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 127 - 130
  • [30] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78